Interoperable Provisioning in a Distributed World



Similar documents
Biometric Single Sign-on using SAML

Biometric Single Sign-on using SAML Architecture & Design Strategies

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Federated Identity in the Enterprise

SAML Federated Identity at OASIS

An Introduction to SCIM: System for Cross-Domain Identity Management

Federated Identity Management Solutions

Trusting XBRL: Using the Liberty Web Services Framework to Secure and Authenticate XBRL Documents

STUDY ON IMPROVING WEB SECURITY USING SAML TOKEN

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

New Single Sign-on Options for IBM Lotus Notes & Domino IBM Corporation

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Gabriel Magariño. Software Engineer. Overview Revisited

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

SAML SSO Configuration

Software Requirement Specification Web Services Security

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Contents at a Glance. 1 Introduction Basic Principles of IT Security Authentication and Authorization in

WEB SERVICES SECURITY

Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM facebook/allidm

SAML Security Option White Paper

Managing SOA Security and Operations with SecureSpan

SAML-Based SSO Solution

NIST s Guide to Secure Web Services

Stronger Authentication with Biometric SSO

Secure the Web: OpenSSO

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

The Primer: Nuts and Bolts of Federated Identity Management

Research and Implementation of Single Sign-On Mechanism for ASP Pattern *

Securely Managing and Exposing Web Services & Applications

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

Setup Guide Access Manager 3.2 SP3

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. SSO Integration Overview

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

IMPLEMENTING SINGLE SIGN- ON USING SAML 2.0 ON JUNIPER NETWORKS MAG SERIES JUNOS PULSE GATEWAYS

SAML:The Cross-Domain SSO Use Case

GFIPM & NIEF Single Sign-on Supporting all Levels of Government

SAP NetWeaver Single Sign-On. Product Management SAP NetWeaver Identity Management & Security June 2011

OpenHRE Security Architecture. (DRAFT v0.5)

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Federated Identity and Trust Management

User Management Interfaces for Earth Observation Services Abstract Test Suite

The Primer: Nuts and Bolts of Federated Identity Management

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

UNI. UNIfied identity management. Krzysztof Benedyczak ICM, Warsaw University

HP Software as a Service. Federated SSO Guide

Fundamentals of Web Programming a

Requirement Priority Name Requirement Text Response Comment

Authentication and Single Sign On

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

Bindings for the Service Provisioning Markup Language (SPML) Version 1.0

Liberty Alliance Project Setting the Standard for Federated Network Identity

Domain 12: Guidance for Identity & Access Management V2.1

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Agenda. How to configure

Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List

Get Cloud Ready: Secure Access to Google Apps and Other SaaS Applications

RSA Solution Brief. Federated Identity Manager RSA. A Technical Overview. RSA Solution Brief

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

Improving Security and Productivity through Federation and Single Sign-on

Flexible Identity Federation

Masdar Institute Single Sign-On: Standards-based Identity Federation. John Mikhael ICT Department

IBM Tivoli Federated Identity Manager V6.2.2 Implementation. Version: Demo. Page <<1/10>>

Run-time Service Oriented Architecture (SOA) V 0.1

Java Security Web Services Security (Overview) Lecture 9

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

WebLogic Server 7.0 Single Sign-On: An Overview

Service Provisioning Markup Language (SPML) Version 1.0

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

An Oracle White Paper August Oracle OpenSSO Fedlet

SAML Security Analysis. Huang Zheng Xiong Jiaxi Ren Sijun

Get Success in Passing Your Certification Exam at first attempt!

The State of California

Apigee Gateway Specifications

Setup Guide Access Manager Appliance 3.2 SP3

Introduction to SAML

Open Source Identity Management

SAML-Based SSO Solution

Entitlements Access Management for Software Developers

How To Use Saml 2.0 Single Sign On With Qualysguard

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Biometric SSO Authentication Using Java Enterprise System

Perceptive Experience Single Sign-On Solutions

Using SAML for Single Sign-On in the SOA Software Platform

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

Transcription:

Interoperable Provisioning in a Distributed World Mark Diodati, Burton Group Ramesh Nagappan, Sun Microsystems Sampo Kellomaki, SymLabs 02/08/07 IAM 302

Contacts Mark Diodati (mdiodati@burtongroup.com) Ramesh Nagappan (Ramesh.Nagappan@Sun.COM) Sampo Kellomaki (sampo@symlabs.com)

References OASIS PSTC SPML 2.0 Specifications http://docs.oasis-open.org/provision/spml-2.0-cd-01/pstc-spml2-cd-01.pdf OpenSPML 1.0 Toolkit www.openspml.org JAX-WS 2.0 Reference Implementation https://jax-ws.dev.java.net/ Identity provisioning with SPML Patterns and Best practices. www.coresecuritypatterns.com Sun Java System Identity Manager (Supports SPML 2.0) Download at http://www.sun.com/download/products.xml?id=453fe041 SPML: Gaining Maturity (Burton Group research document) www.burtongroup.com/spml

Agenda Presentation Mark Diodati Presentation Ramesh Nagappan Presentation Sampo Kellomaki References

Identity Management - Provisioning Subjects (Users, services) Internal Business Units Federation Affiliate Enterprises Public Identity Services Authentication and reduced sign-on Access Gateway Federation Proxy Policy Enforcement Infrastructure Access proxy Authorization Firewalls Other Identity & Policy Admin Delegated admin, self-service Identity Data Services Platform- or application-specific policy enforcement Objects (Applications, services, resources) Provisioning Services Directory Replication Management and Audit Virtualization Identities, roles, groups Synchronization

Federated Provisioning The federation standards and products are mature from a technology perspective Provide good user SSO (authentication) for web applications Possess some authorization capabilities Lack user identity provisioning capabilities Many (most) service provider (SP) applications require a nonephemeral identity The identity provider (IdP) and SP must agree upon a provisioning protocol to meet this requirement How are identities provided to the SP?

Batch Approach Using an out-of-band process, the IdP sends using provisioning information (adds, changes, deletions) to the SP Excel spreadsheet, EDI, or other Benefits Low technology barrier Challenges Slower updates can introduce service and liability issues IdP may not have a mechanism to verify user identities status May introduce burdensome manual processes for both the IdP and the SP

LDAP Replication Approach Identity Provider (IdP) (5) Application retrieves SAML assertion (6) Application retrieves user attributes Service Provider Identity Store (4) User with SAML artifact attempts access Darth Sidious Service Provider Application (1) User information is replicated to onsite store (LDAPS) Master LDAP Store Darth Sidious Local LDAP Store Darth Sidious

Assertion Approach Name = Darth Sidious SSN = 555-55-5555 Group = Sith (2) Application retrieves SAML assertion Identity Provider (IdP) SAML assertion (3) Application creates user identity (1) User with SAML artifact attempts access Service Provider Application Service Provider Identity Store Darth Sidious Darth Sidious

Services Provisioning Markup Language (SPML) SPML v1 approved in 2003 Some Essential operations were not included (had to be customized) Some errors in XML schema SPML v2 OASIS standard approved in spring of 2006 Essential functions included Three profiles DSML (most commonly used and existed in v1) XSD (new in v2, from WS-Provisioning proposal) SAML (currently in development) to provide tighter integration of user attributes Good provisioning vendor support Widely adopted by the provisioning vendors (Sun, CA, BMC, HP, Oracle, Siemens) Improving target vendor support Citrix, SAP, MaxWare

SPML Benefits Interoperable provisioning (no custom connectors required) Reliability Some auditing and correlation Challenges Requires a separate channel for federated provisioning User schema will likely require pre-agreement Does not provide protocol security (by intent) Authentication and confidentiality - use HTTPS and/or WS-Security 2004 Authorization may be achieved via certificate trust list or may require more advanced authorization features in the future Provisioning tools can provide authorization capabilities

SPML Federated Provisioning (2) User added

Agenda Presentation Mark Diodati Presentation Ramesh Nagappan Presentation Sampo Kellomaki References

The State of SPML 2.0 SPML 2.0 has been ratified as an OASIS standard. Builds on the concepts of SPML 1.0 specifications. Maintains the core protocol, basic roles, operations, data types and elements. Core protocol enables interoperability among Provisioning service providers. Defines modal mechanisms for executing provisioning synchronously or asynchronously. Defines the notion of SPML Profiles. Profiles define the agreement protocol between requestor and service provider. SPML v2 XSD Profile and DSML v2 Profile DSML v2 profile provides the backward compatibility with SPML 1.0 and to support LDAP and X.500 directory services SPML v2 SAML 2.0 Profile is on its way! SPML 2.0 supports extended operations as Capabilities.

SPML 2.0 - Logical components Requesting Authority (RA) Client initiating the SPML requests to the provisioning system. Provisioning Service Provider (PSP) The identity provisioning system that listens, receives, processes SPML requests and returns responses. Executes provisioning operations. Provisioning Service Target (PST) Actual resource where operations are performed. SPML Response Requesting Authority Provisioning Service Provider SPML Request Provisioning Service Object (PSO) Represents the data entity on a PST. (ex. User account) PSO PSO Provisioning Service Targets PSO

SPML 2.0: Operations & Capabilities Core Operations (Mandatory) SPML 2.0 conformant providers must implement all of them Basic Operations addrequest modifyrequest deleterequest lookuprequest Discovery Operation listtargets Optional Capabilities Operations that apply to a specific target and supported by a provider. SPML 2.0 defines a set of standard capabilities Async capability Batch capability Bulk capability Password capability Search capability Suspend capability Updates capability Allows PSP define custom capabilities.

Anatomy of a SPML 2.0 Message Request Message <addrequest xmlns='urn:oasis:names:tc:spml:2:0' requestid='rid-spmlv2' executionmode='synchronous targetid= xyz1`> <openspml:operationalnamevaluepair xmlns:openspml= 'urn:org:openspml:v2:util:xml' name='session' value='aaalpgaayd0a'/> <data> <dsml:attr xmlns:dsml= 'urn:oasis:names:tc:dsml:2:0:core' name='accountid'> <dsml:value>myspmltestid</dsml:value> </dsml:attr> <dsml:attr xmlns:dsml= 'urn:oasis:names:tc:dsml:2:0:core' name='objectclass'> <dsml:value>javaguy</dsml:value> </dsml:attr> <dsml:attr xmlns:dsml= 'urn:oasis:names:tc:dsml:2:0:core' name= password'> <dsml:value>mypasswd</dsml:value> </dsml:attr> </data> </addrequest> Response Message <addresponse xmlns='urn:oasis:names:tc:spml:2:0' status='success' requestid='rid-spmlv2 targetid= xyz1`> <openspml:operationalnamevaluepair xmlns:openspml='urn:org:openspml:v2:util:xml' name='session' value='aaalpgaayd0a'/> <pso> <psoid ID= myspmltestid'/> <data> <dsml:attr xmlns:dsml='urn:oasis:names:tc:dsml:2:0:core name='accountid'> <dsml:value>myspmltestid</dsml:value> </dsml:attr> <dsml:attr xmlns:dsml='urn:oasis:names:tc:dsml:2:0:core name='objectclass'> <dsml:value>javaguy</dsml:value> </dsml:attr> <dsml:attr xmlns:dsml='urn:oasis:names:tc:dsml:2:0:core' name= password'> <dsml:value>mypasswd</dsml:value> </dsml:attr> </data> </pso> </addresponse>

SPML Based Provisioning via Web Services UDDI WSDL Requesting Authority SOAP WS-Security SPML Provisioning Service Provider Provisioning Service Targets

SPML Relationship with WS-Security and SAML SPML recommends the use of SSL/TLS protocols and WS-Security for ensuring Transport-layer and Message-layer security. SPML can take advantage of SOAP/HTTPS transport provisioning requests and responses. XML Encryption and XML Digital Signature allows to ensure SPML message/elementlevel confidentiality and integrity. WS-Security tokens (X.509, SAML Token) to authenticate provisioning service providers. SPML supports the principles of using SAML 2.0 and Project Liberty Alliance standards. SPML requests and responses can make use of SAML assertions as a authentication context between the requesting authority and provisioning systems. SAML assertions from an Identity provider can be used to qualify a subject on a provisioning target.

Role of SPML in Identity Federation (Liberty ID-FF) ID-FF: Circle of Trust Internet Service Provider Identity Provider Service Requester Use SAML Assertions Service providers can issue SPML requests based on a SAML Authorization Decision Assertion. Helps dynamic/on-demand provisioning of roles, privileges, resources etc. Service Providers (Out-sourced) SPML

Implementing SPML with Java OpenSPML 1.0 Toolkit Comprehensive vendor-independent Java API toolkit for SPML 2.0. Java classes for constructing/parsing SPML requests and responses support implementing a SPML 2.0 conformant requesting authority. Supports SPML 2.0 profiles (DSML v2 and XML Schema) and its supporting Java/XML bindings. Web container pluggable SOAP runtime for sending/receiving SPML messages via SOAP over HTTP. JAX-WS 2.0 Java API toolkit for developing WS-I Basic Profile 1.1 compliant XML Web Services. Helps to build SPML Web Services with WS-Security. OpenSPML Toolkit can be plugged for creating SPML constructs.

Agenda Presentation Mark Diodati Presentation Ramesh Nagappan Presentation Sampo Kellomaki References

Liberty Provisioning Initiatives For avoidance of doubt Trusted Module provisioning (liberty-idwsf-prov-v1.0-02.pdf) Very specific target: Advanced Clients and Trusted Modules Not applicable in this domain General provisioning Some marketing requirement floated No specific approach chosen SPML, enhanced with ID-WSF, could be an option

MED1 ID-DAP Overview

Slide 24 MED1 If this is not a specification or a standard, we cannot discuss in detail, since it breaks interoperability. Mark Diodati, 1/26/2007

Health Care Use Case

Tentative Liberty Provisioning Map

Panel Discussion